Digital Watermarking and Steganography: Fundamentals and Techniques [Paperback]

US $82.96
ApproximatelyS$ 108.06
or Best Offer
Condition:
Like New
Breathe easy. Returns accepted.
Shipping:
Free USPS Media MailTM.
Located in: 20772, United States
Delivery:
Estimated between Fri, 14 Nov and Mon, 17 Nov to 94104
Delivery time is estimated using our proprietary method which is based on the buyer's proximity to the item location, the shipping service selected, the seller's shipping history, and other factors. Delivery times may vary, especially during peak periods.
Returns:
30 days return. Buyer pays for return shipping. If you use an eBay shipping label, it will be deducted from your refund amount.
Coverage:
Read item description or contact seller for details. See all detailsSee all details on coverage
(Not eligible for eBay purchase protection programmes)
Seller assumes all responsibility for this listing.
eBay item number:146243422949
Last updated on Aug 26, 2025 20:56:32 SGTView all revisionsView all revisions

Item specifics

Condition
Like New: A book in excellent condition. Cover is shiny and undamaged, and the dust jacket is ...
Book Title
See Title Above
ISBN
9781420047578
Category

About this product

Product Identifiers

Publisher
CRC Press LLC
ISBN-10
1420047574
ISBN-13
9781420047578
eBay Product ID (ePID)
57028840

Product Key Features

Number of Pages
200 Pages
Publication Name
Digital Watermarking and Steganography : Fundamentals and Techniques
Language
English
Subject
Communication Studies, Internet / General, Electrical, Graphic Arts / General, Imaging Systems
Publication Year
2007
Type
Textbook
Subject Area
Design, Computers, Technology & Engineering, Language Arts & Disciplines
Author
Frank Y. Shih
Format
Hardcover

Dimensions

Item Height
0.7 in
Item Weight
14.4 Oz
Item Length
9.5 in
Item Width
7.2 in

Additional Product Features

Intended Audience
College Audience
LCCN
2007-034224
Dewey Edition
23
Illustrated
Yes
Dewey Decimal
005.8/2
Table Of Content
Introduction Digital Watermarking Digital Steganography Differences between Watermarking and Steganography A Brief History Appendix: Selected List of Books on Watermarking and Steganography Classification in Digital Watermarking Classification Based on Characteristics Classification Based on Applications Mathematical Preliminaries Least-Significant-Bit Substitution Discrete Fourier Transform (DFT) Discrete Cosine Transform Discrete Wavelet Transform Random Sequence Generation The Chaotic Map Error Correction Code Set Partitioning in Hierarchical Tree Digital Watermarking Fundamentals Spatial-Domain Watermarking Frequency-Domain Watermarking The Fragile Watermark The Robust Watermark Watermarking Attacks and Tools Image Processing Attacks Geometric Transformation Cryptographic Attack Protocol Attacks Watermarking Tools Combinational Digital Watermarking in the Spatial and Frequency Domains An Overview of Combinational Watermarking Watermarking in the Spatial Domain Watermarking in the Frequency Domain Experimental Results Further Encryption of Combinational Watermarking Genetic Algorithm-Based Digital Watermarking Introduction to the Genetic Algorithm The Concept of Genetic Algorithm-Based Watermarking Genetic Algorithm-Based Rounding-Error Correction Watermarking An Application for Medical Image Watermarking Adjusted-Purpose Digital Watermarking An Overview of Adjusted-Purpose Digital Watermarking The Morphological Approach for Extracting Pixel-Based Features The Strategies for Adjusting the Varying-Sized Transform Window and Quality Factor Experimental Results The Collecting Approach for Generating the VSTW Robust High-Capacity Digital Watermarking The Weakness of Current Robust Watermarking The Concept of Robust Watermarking Enlargement of Significant Coefficients The Determination of Embedding Locations The RHC Watermarking Algorithm Experimental Results Introduction to Digital Steganography Types of Steganography Applications of Steganography Embedding Security and Imperceptibility Examples of Steganographic Software Steganalysis An Overview The Statistical Properties of Images The Visual Steganalytic System IQM-Based Steganalytic System Learning Strategies The Frequency-Domain Steganalytic System Genetic Algorithm-Based Steganography An Overview of the GA-Based Breaking Methodology The GA-Based Breaking Algorithm on the FDSS Experimental Results Complexity Analysis Index
Synopsis
Every day millions of people capture, store, transmit, and manipulate digital data. Unfortunately free access digital multimedia communication also provides virtually unprecedented opportunities to pirate copyrighted material. Providing the theoretical background needed to develop and implement advanced techniques and algorithms, Digital Watermarking and Steganography? ? Demonstrates how to develop and implement methods to guarantee the authenticity of digital media ? Explains the categorization of digital watermarking techniques based on characteristics as well as applications ? Presents cutting-edge techniques such as the GA-based breaking algorithm on the frequency-domain steganalytic system. The popularity of digital media continues to soar. The theoretical foundation presented within this valuable reference will facilitate the creation on new techniques and algorithms to combat present and potential threats against information security., Every day millions of people capture, store, transmit, and manipulate digital data. Unfortunately free access digital multimedia communication also provides virtually unprecedented opportunities to pirate copyrighted material. Providing the theoretical background needed to develop and implement advanced techniques and algorithms, Digital Watermarking and Steganography: Demonstrates how to develop and implement methods to guarantee the authenticity of digital media Explains the categorization of digital watermarking techniques based on characteristics as well as applications Presents cutting-edge techniques such as the GA-based breaking algorithm on the frequency-domain steganalytic system The popularity of digital media continues to soar. The theoretical foundation presented within this valuable reference will facilitate the creation on new techniques and algorithms to combat present and potential threats against information security., In addition to providing students, researchers, and other professionals with mechanical information regarding digital watermarking and steganography, this work also provides them with the framework to develop extensive advanced techniques. It shows how robust high-capacity watermarking techniques can be successfully used to enlarge the hiding capacity while maintaining the robustness of the watermark. Several robust algorithms are presented to illustrate the framework and provide assistance in understanding and implementing fundamental principles. Alternatives to traditional strategies are presented. The principles taught are illustrated with plentiful graphs and examples in order to simplify the problems and make highly complicated theories readily understandable.
LC Classification Number
QA76.9.A25S467 2007

Item description from the seller

About this seller

Jays Bookstore

99.7% positive feedback1.2K items sold

Joined Sep 2001
I have been selling on Ebay since the year 2001. Customer satisfaction is truly my number one priority. Towards this end, I strive to ship all orders same or next day (including Saturdays). Thank you ...
See more

Detailed Seller Ratings

Average for the last 12 months
Accurate description
4.9
Reasonable shipping cost
4.9
Shipping speed
5.0
Communication
5.0

Seller feedback (455)

All ratingsselected
Positive
Neutral
Negative
  • c***9 (1524)- Feedback left by buyer.
    Past 6 months
    Verified purchase
    Packaged very well, Quickly Shipped, Amazing condition as described and a Great Price!! Highly recommend this Seller! Beyond Satisfied!!
  • e***8 (132)- Feedback left by buyer.
    Past year
    Verified purchase
    I ordered 3 DVDs from this seller - and they all arrived in perfect condition! Well-packaged and SUPER-QUICK shipping. And at a fantastic price. Thanks for a superb transaction! I would highly recommend this seller and I hope to find more deals from them soon.
  • f***l (980)- Feedback left by buyer.
    Past 6 months
    Verified purchase
    ★★ª ˜¨¨★ª ˜¨¨¯¯¨¨˜ª¤.¸`*•.¸*•¸☆☆EXCELLENT☆☆¸•*¸.•*´¸.¤ª˜¨¨¯¯¨¨˜ ª★¨¨˜ ª★★ Outstanding seller! Items was just as described and shipped in a timely manner. Thank you!